GuLoader malicious software downloader: from 'COVID-19' phishing to 'SF Express' phishing

0 22
Event Overview GuLoader is a malicious software downloader written in VB langua...

Event Overview

GuLoader is a malicious software downloader written in VB language, and it often hosts the final malicious files on shared cloud storage services such as Google Drive, Microsoft OneDrive, and MediaFire, etc. The malicious software they often deliver includes LokiBot, Formbook, and Agent Tesla, etc. The GuLoader program itself has a very complex process and anti-features to prevent security personnel from analyzing it. In March of this year, during the severe period of the COVID-19 pandemic in China, Ma Lian had releasedSpreading through phishing emails on the topic of the 'COVID-19 pandemic'.Another article about this malicious software,The Gorgon APT organization also used the GuLoader malicious software downloader to distribute the Formbook spyware., and a comparative analysis of the two has been done, detailed in the links in the reference information.

This sample was obtained earlier, but due to various things, I have not written any related articles to report it. There have been other security vendors that have analyzed and released information about this sample. Nevertheless, as Ma Lian believes that this event is still worth everyone's attention, this malicious program is still active and the detection rate is relatively low. In addition, this version of the GuLoader malicious software downloader has added some new anti-features compared to previous versions.

GuLoader malicious software downloader: from 'COVID-19' phishing to 'SF Express' phishing

Event Analysis

The GuLoader malicious software downloader analyzed in this study was spread through phishing emails containing 'SF Express', mainly targeting Chinese users. The previous phishing emails related to the 'COVID-19' topic were all in English, mainly targeting English-speaking countries. This time's phishing email uses Chinese language and has obvious regional attacks.

This sample still uses the executable file with the same icon as before, written in VB language. Specific information is as follows:

Dynamically allocate memory, copy the shellcode to the relevant area, and then jump to execute.

New Countermeasure Function

1. Use the ZwQueryVirtualMemory function to query the virtual memory, with the memory query area being 0x00001000~0x7FFFF000. If a string related to the virtualization environment is found in this memory, the process will be terminated.

During the query process, query sequentially with memory alignment of 0x1000.

If found, it indicates that the virtual machine environment is present, and a string will be decrypted and provided for subsequent pop-up prompts.

Then call the MessageBox function to pop up a prompt indicating that the program is running in a virtual machine environment, and finally end the process.

2. Enumerate the top-level window handle values, and if the value is less than 0x0C, the process will be terminated.

3. Detect Qemu environment by checking for the existence of related files through the CreateFile method.

Other Countermeasures Analysis(For detailed technical descriptions, please refer to the previous analysis articles, see the reference information section)

1. Modify the debugging-related function code to prevent additional analysis.

2. Set the parameters of the ZwSetInformationThread function to 0x11.

3. Multiple checks for hardware breakpoints.

After all these tests are completed, injection operations will be performed, and then malicious software such as remote control trojans and spyware will be downloaded from the hosting site, which is the same as the functionality of the previous version of GuLoader.

Solution

1. Do not click on links and attachments in emails from unknown senders, especially those related to express delivery orders, order confirmation, or information confirmation, etc., which are particularly worth noting.

2. Timely upgrade the virus code version of security products to ensure timely detection and removal of related malicious software.

3. Regularly modify and strengthen your cloud disk password to prevent hackers from using your cloud disk.

Reference Information

Gorgon APT Group in Action: From Google Drive to Formbook Spyware

 Spreading FormBook Spyware by Using the Topic of the COVID-19 Pandemic

 Manufacturer Report

你可能想看:

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Analysis of Windows spyware, will you still easily download Windows crack software

Analysis of macOS spyware, are you still dare to download cracked macOS software easily?

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Businesses going abroad for compliance: how to distinguish between data controllers and data processors

After studying, we classify the aforementioned AMSI components according to the documents provided by Microsoft:

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

最后修改时间:
admin
上一篇 2025年03月29日 11:03
下一篇 2025年03月29日 11:26

评论已关闭